Browse Definitions :

Browse Definitions by Alphabet

BOO - BUR

  • book of business - Book of business is another name for an account or client list.
  • booking engine - A booking engine is a software as a service (SaaS) application used by hospitality businesses to provides guests with the opportunity to reserve a property online.
  • bookmark - Using a World Wide Web browser, a bookmark is a saved link to a Web page that has been added to a list of saved links.
  • Boolean - The term "Boolean," often encountered when doing searches on the Web (and sometimes spelled "boolean"), refers to a system of logical thought developed by the English mathematician and computer pioneer, George Boole (1815-64).
  • Boolean operator - Boolean operators are a common type of search operator, sometimes referred to as a search parameters, which are characters or strings of characters – including words and phrases – that are used in a search engine query to narrow the focus of the search.
  • boot - To boot (as a verb; also "to boot up") a computer is to load an operating system into the computer's main memory or random access memory (RAM).
  • BOOT (build, own, operate and transfer) - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • boot loader (boot manager) - A boot loader, also called a boot manager, is a small program that places the operating system (OS) of a computer into memory.
  • boot partition - A boot partition is a disk partition responsible for holding Windows system files when booting up Windows.
  • boot sector - A boot sector is a specially assigned section of a storage drive containing the files required to start the operating system (OS) and other bootable programs such as antivirus programs, drive partitioning software, backup tools and diagnostic disks.
  • boot sector virus - A boot sector virus is malware that infects the computer storage sector where startup files are found.
  • Boot2Docker - Boot2Docker is a minimalist Linux distribution with the sole purpose to run Docker containers.
  • BOOTP (Bootstrap Protocol) - BOOTP (Bootstrap Protocol) is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
  • Bootstrap - Bootstrap is a free, open source front-end development framework for the creation of websites and web apps.
  • BOPIS (buy online, pick up in-store) - BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up their purchases in the brick-and-mortar store, often within the same day.
  • Boston Dynamics - Boston Dynamics is an American robotics research and development company, known for producing numerous robot designs and their ongoing testing in real-world environments and simulated tasks.
  • bot - A bot -- short for robot and also called an internet bot -- is a computer program that operates as an agent for a user or other program or to simulate a human activity.
  • bot herder - A bot herder is a hacker that seeks out vulnerable computers and infects them so that they can be controlled as a botnet.
  • bot worm - A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers.
  • botnet - A botnet is a collection of internet-connected devices, which may include personal computers (PCs), servers, mobile devices and internet of things (IoT) devices, that are infected and controlled by a common type of malware, often unbeknownst to their owner.
  • botnet sinkhole - A botnet sinkhole is a target machine used by researchers to gather information about a particular botnet.
  • Boto - Boto is a software development kit (SDK) designed to improve the use of the Python programming language in Amazon Web Services.
  • bottleneck - A bottleneck, in a communications context, is a point in the enterprise where the flow of data is impaired or stopped entirely.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • Bourne shell - The Bourne shell is the original Unix shell -- command execution program, often called a command interpreter -- that was developed in 1979 at what at the time was Bell Labs.
  • boustrophedon - Boustrophedon (from Greek for ox-turning) is writing that proceeds in one direction in one line (such as from left to right) and then in the reverse direction in the next line (such as from right to left).
  • Box (Box.net) - Box is an online file-sharing, storage and collaboration service provider that caters to individual users as well as businesses.
  • box plot - A box plot is a graphical rendition of statistical data based on the minimum, first quartile, median, third quartile, and maximum.
  • BPaaS (Business Process as a Service) - Business Process as a Service (BPaaS) is a form of business process outsourcing (BPO) that employs a cloud computing service model.
  • BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that allows web services, APIs and human processes in a service-oriented architecture (SOA) to interconnect and share data in a business workflow.
  • brain dump - A brain dump (sometimes spelled braindump, or brain-dump) is a complete transfer of accessible knowledge about a particular subject from your brain to some other storage medium, such as paper or your computer's hard drive.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • brain hijacking - Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.
  • brain-computer interface (BCI) - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • brainstorming - Brainstorming is a group problem-solving method that involves the spontaneous contribution of creative ideas and solutions.
  • branching - Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.
  • brand - A brand is a product, service or concept that is publicly distinguished from other products, services or concepts so that it can be easily communicated and usually marketed.
  • brand ambassador - A brand ambassador is an advocate of a particular company's products and services.
  • brand equity - Brand equity is the perceived value a company gains by having a known name, logo or other identifier.
  • brand essence (brand mantra) - Brand essence, also known as a brand mantra, is a short statement that expresses the core of what that brand represents or the image it seeks to project.
  • brand experience - Brand experience is a type of experiential marketing that incorporates a holistic set of conditions created by a company to influence the feeling a customer has about a particular product or company name.
  • brand recognition - Brand recognition is the extent to which a consumer can correctly identify a particular product or service just by viewing the product or service's logo, tag line, packaging or advertising campaign.
  • brandjacking - Brandjacking is an act that allows an individual or company to assume or exploit a brand's identity to undermine that brand.
  • breach detection system (BDS) - Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • break/fix - For IT services companies, break/fix is a method of providing IT support to customers.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • brick server - A brick server is a compact computer server module without a chassis that can come in various processor, RAM, I/O, and storage configurations and is designed to fit into rack locations similar to those for blade servers.
  • bridge - A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a local-area network (LAN).
  • bridge tap - A bridge tap is an extraneous length of dangling, unterminated cable on a communications line, usually left over from an earlier configuration, that can cause impedance mismatches and other undesired effects in transmissions.
  • bright-line rule - A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.
  • bring your own apps (BYOA) - Bring your own apps (BYOA) is the trend toward employee use of third-party applications and cloud services in the workplace.
  • bring your own cloud (BYOC) - BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace.
  • bring your own everything (BYOx) - Bring your own everything (BYOx) is a term that refers to employees' use of personal technology to perform work tasks.
  • British Standards Institution (BSI) - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British thermal unit (Btu) - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • broadband - In general, broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • broadband voice gateway - A broadband voice gateway is a device that allows you to make telephone calls over a high-speed Internet connection rather than through a regular telephone outlet without having to go through your computer.
  • broadcast - In general, to broadcast (verb) is to cast or throw forth something in all directions at the same time.
  • brogrammer - A brogrammer is a male programmer with traits often associated with fraternity brothers (bros) rather than the coder's stereotypical geek persona.
  • broken window theory - Broken window theory is the concept that each problem that goes unattended in a given environment affects people's attitude toward that environment and leads to more problems.
  • broker - A broker is someone or something that acts as an intermediary third party, managing transactions between two other entities.
  • brontobyte - A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.
  • brownfield (brownfield deployment, brownfield site) - A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browser isolation - Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing activity from their local machine, network and infrastructure.
  • Browser Shortcut Cheat Sheets - Browser shortcuts cheat sheet collection.
  • browser virtualization (in desktop virtualization) - Virtualizing a browser helps companies run mission-critical applications in legacy browsers.
  • brute-force attack - A brute-force attack is a trial-and-error method used by application programs to decode login information and encryption keys to use them to gain unauthorized access to systems.
  • BSA | The Software Alliance - BSA | The Software Alliance is an advocate for public policies that foster technology innovation and drive economic growth.
  • BSD (Berkeley Software Distribution) - BSD (originally: Berkeley Software Distribution) refers to the particular version of the UNIX operating system that was developed at and distributed from the University of California at Berkeley.
  • BSD licenses - BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution.
  • bubble help - In a computer user interface, bubble help is text information that is displayed in a small balloon or box when a computer user moves the mouse cursor over a selected user interface element, such as the iconic items in a task bar.
  • bubble network - A bubble network is a series of interconnected virtual machines (VMs) that communicate through a virtual network switch (vSwitch) and remain isolated from the physical network.
  • budgeting, planning and forecasting (BP&F) - Budgeting, planning and forecasting (BP&F) is a three-step strategic planning process for determining and detailing an organization's long- and short-term financial goals.
  • buffer - A buffer is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities.
  • buffer overflow - A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold.
  • buffer underflow - Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the temporary holding space during information transfer, the buffer, is fed at a lower rate than it is being read from.
  • bug - In computer technology, a bug is a coding error in a computer program.
  • bug bounty program - A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding errors in software.
  • Bugbear - Bugbear is a computer virus that spread in early October, 2002, infecting thousands of home and business computers.
  • build - In a programming context, a build is a version of a program that, as a rule, is a pre-release version and is identified by a build number rather than by a release number.
  • build server - A build server is a machine on which a software project can be continuously built from changes that are committed to the repository.
  • build to order - Build to order is a methodology and manufacturing practice where a product is created once a confirmed order is received.
  • build tool - A build tool is a programming utility that automates a software build task, such as ensuring that the proper source code files are compiled and that the proper object files are linked, after changes have been made to a program.
  • build-measure-learn (BML) - Build-measure-learn (BML) is a process of building a product, measuring consumer metrics and learning from them to better respond to customer needs and improve the product for the ultimate sustainability of the company.
  • building management system - Building management system (BMS) is a computer system that tracks power used by IT equipment and air conditioning systems in the data center.
  • built-in administrator account - In the Windows operating system, the built-in administrator account -- the first account created when the OS was installed -- has the highest permissions of any profile on the computer system.
  • bulk data transfer - Bulk data transfer is a software application feature that uses data compression, data blocking and buffering to optimize transfer rates when moving large data files.
  • bulk power system (BPS) - A bulk power system (BPS) is a large interconnected electrical system made up of generation and transmission facilities and their control systems.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • Bullwhip Effect - The bullwhip effect is a supply chain phenomenon describing how small fluctuations in demand at the retail level can cause progressively larger fluctuations in demand at the wholesale, distributor, manufacturer and raw material supplier levels.
  • burn - Burn is a colloquial term meaning to write content to a CD, DVD, or other recordable disc.
  • burn down chart - A burn down chart is a visual representation of the amount of work that still needs to be completed before the end of a project.
  • burn rate - In venture investing and new company development, the burn rate is the rate at which a new company is spending its capital while waiting for profitable operation.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • burner phone - A burner is an inexpensive mobile phone that is designed for temporary use, after which it may be discarded.
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close